Lesson 5: Secure Enterprise Network Architecture Flashcards

1
Q

What does a secure network architecture support?

A

Confidentiality, integrity, and availability for workflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key components of enterprise network architecture?

A

Network Infrastructure: Media, appliances, and protocols for connectivity.

Network Applications: Services supporting business tasks (e.g., email).

Data Assets: Information created and transferred by workflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the layers of the Network Layers (OSI Model)?

A

Layer 1 - Physical

Layer 2 - Data Link

Layer 3 - Network

Layer 4 - Transport

Layer 5 - Session

Layer 6 - Presentation

Layer 7 - Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Network Layers (OSI Model): Layer 1 (Physical)

Provide examples

A

Transmits raw bit stream data over the physical medium

Examples:
- Twisted-pair cables
- Fiber Optic
- Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Network Layers (OSI Model):
Layer 2 (Data Link)

Provide examples

A

Defines the format of data on the network

  • Switches
  • MAC Addresses
  • VLANs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Network Layers (OSI Model):
Layer 3 (Network)

Provide examples

A

Decides which path the data will take, determining the best path for data delivery

  • Routers
  • IP Addresses
  • Subnetting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Network Layers (OSI Model):
Layer 4 (Transport)

Provide examples

A

Transmits data using transmission protocols including TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Network Layers (OSI Model):
Layer 5 (Session)

Provide examples

A

Maintains connections and is responsible for controlling ports and sessions between applications.

Uses protocols like Syn/Ack (used in TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Network Layers (OSI Model):
Layer 6 (Presentation)

Provide examples

A

Handles data formatting, encryption, and compression, ensuring data is presented in a readable format.

Examples:
- Encryption protocols (SSL/TLS),
- Data Compression
- Character Encoding (ASCII, UTF-8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Network Layers (OSI Model):
Layer 7 (Application)

Provide examples

A

Provides network services to applications, allowing users to interact with the network

Examples:
- Hypertext Transfer Protocol (HTTP) for web browsing
- File Transfer Protocol (FTP) for file transfer
- Simple Mail Transfer Protocol (SMTP) for email
- Simple Network Management Protocol (SNMP) for network management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of VLANs?

A

VLANs segment networks into distinct broadcast domains. This improves security and performance.

Each VLAN maps to unique subnet, requiring routing for inter-VLAN communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are security zones used in a network?

A

They segregate workflows (ex. public-facing servers vs. internal clients).
They use firewalls to enforce least privilege and control traffic between zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does “defense in depth” mean in network security?

A

Implementing multiple layers of security to protect against intrusions by analyzing vulnerabilities at Layers 1-7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of port security?

A

MAC Filtering/Limiting: Limits the number of MAC addresses per switch port.

802.1X Authentication: Ensures secure authentication at switch ports using EAP and RADIUS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is physical isolation in a network?

A

Using air-gapped hosts/networks that are physically disconnected from other networks to secure critical systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name three types of firewalls and their features.

A

Packet Filtering: Inspects IP, protocol, and port headers.

Stateful Inspection: Tracks session information to identify anomalies.

Layer 7 Firewalls: Application-aware filtering to inspect traffic content.

17
Q

What is the difference between IDS and IPS?

A

IDS (Passive): Captures traffic and raises alerts for suspicious patterns.

IPS (Active): Blocks or redirects malicious traffic.

18
Q

What is the role of load balancers?

A

They distribute traffic across server pools to enhance availability and prevent overload.

19
Q

What do Next-Generation Firewalls (NGFW) entail?

A

They integrate Intrusion Prevention Services (IPS), Deep Packet Inspection, Role-based policies, and cloud connectivity.

20
Q

What does “Unified Threat Management (UTM)” include?

A

A single appliance combining firewall, antimalware, spam filtering, VPN, and more.

21
Q

What distinguishes Layer 4 and Layer 7 load balancers?

A

Layer 4 load balancers, based on IP/TCP values , focus on routing based on IP addresses and ports.

Layer 7 load balancers, like Application Load Balancers (ALB), can inspect application-layer data for more complex routing. Its content-aware with session persistence.

22
Q

What does a Web Application Firewall (WAF) protect against?

A

It protects web applications against attacks like code injection and denial-of-service (DoS).

23
Q

What are the two main types of VPN architectures?

A

Client-to-Site VPN: Remote workers connect securely to corporate networks.

Site-to-Site VPN: Connects two networks, such as branch offices.

24
Q

What are the components of IPsec for VPNs and what do they do?

A

Authentication Header (AH): Verifies integrity.

Encapsulating Security Payload (ESP): Encrypts data for confidentiality.

25
Q

What does Transport Layer Security (TLS) do?

A

It provides application-level encryption.
Its used for securing communications over a network, including VPNs, by encrypting data and verifying the identities of communicating parties

26
Q

What does the Internet Key Exchange (IKE) protocol handle in IPsec?

A

IKE handles mutual authentication, cipher selection, and key exchange for IPsec.

27
Q

What is a Remote Desktop Access provide?

A

Remote Desktop Access (RDP) provides encrypted connections to physical/virtual desktops or apps.

Alternatives to RDP is HTML5-based clientless remote desktop tools.

28
Q

What is SSH used for?

A

Encrypts terminal access for administration and file transfers.

Key features for SSH:
- Host keys for server identification.
- Authentication via username/password, public keys, or
Kerberos tickets.

29
Q

What are out-of-band (OOB) management channels used for?

A

Providing isolated management access for network appliances.

30
Q

What is a Jump Server?

A

A dedicated admin server controlling access to secure zones, by acting as a central point of access, preventing direct access to sensitive systems from untrusted networks.